Global visionاتصالات وتقنيةالأخبارخدمات القراء

Kaspersky Warns of RenEngine Malware Spread via Pirated Software

KHADAMATYNEW

Kaspersky has identified RenEngine, a malware loader distributed through pirated games and cracked software, expanding the threat surface beyond the gaming community

Although RenEngine samples were first detected in March 2025, recent investigations show attackers created dozens of websites offering infected installers, including pirated productivity tools such as CorelDRAW

The malware campaign has affected users in multiple countries, including Russia, Brazil, Turkey, Spain, and Germany, indicating opportunistic rather than targeted attacks

Initially used to deliver Lumma Stealer, current variants deploy ACR Stealer, with Vidar Stealer also observed. The infection chain leverages modified games built on the Ren’Py engine. When launched, fake loading screens mask malicious background activity, which then deploys HijackLoader to execute multi-stage payloads

Kaspersky detects RenEngine as Trojan.Python.Agent variants, while HijackLoader is identified as Trojan.Win32.Penguish and Trojan.Win32.DllHijacker

The company advises users to download software only from official sources, keep systems updated, and use advanced security solutions such as Kaspersky Premium to mitigate evolving cyber threats